What are the support values of the preceding itemsets

Assignment Help Basic Computer Science
Reference no: EM132186142

A local retailer has a database that stores 10,000 transactions of last summer. After analyzing the data, a data science team has identified the following statistics:

  • {battery} appears in 4,000 transactions.
  • {sunscreen} appears in 3,000 transactions.
  • {sandals} appears in 4,000 transactions.
  • {bowls} appears in 1,000 transactions.
  • {battery, sunscreen} appears in 1,500 transactions.
  • {battery, sandals} appears in 1,000 transactions.
  • {battery, bowls} appears in 1250 transactions.
  • {battery, sunscreen, sandals} appears in 600 transactions.

Answer the following questions:

a. What are the support values of the preceding itemsets?

b. Assuming the minimum support is 0.05, which itemsets are considered frequent?

c. What are the confidence values of {battery}->{ sunscreen} and {battery, sunscreen}->{ sandals} ?

d. Which of the two rules is more interesting?

 

Reference no: EM132186142

Questions Cloud

Willing to pay for expedited handling : If you are willing to pay for expedited handling, you can be paid in one month. Would you be willing to pay $50? $100? $200? More?
How mary should approach the negotiation process : Imagine that you are one of the associates, Mary McDeere, who is a Tax Attorney. She is a fourth-year Associate who is about to experience the toughest stretch.
Change the global trade and investiment : How did the Cartagena protocol on biodiversity change the global trade and investiment? did it have a positive or a negative impact on trade?
Important source of economic growth : Growth accounting shows that technological progress is an important source of economic growth.
What are the support values of the preceding itemsets : a. What are the support values of the preceding itemsets? b. Assuming the minimum support is 0.05, which itemsets are considered frequent?
What management and technology issues would you consider : What management, organization, and technology issues would you consider if you wanted to move from a traditional bureaucracy to a flatter organization?
What do you think about the future of web servers : What are the names of some different software for Web Servers? What do you think about the future of Web Servers?
Work with regular expressions : How can direct string matching be changed to work with regular expressions?
What the relevant cash flows associated with each project : BRIDGEHAMPTON SHORES INN: MUTUALLY EXCLUSIVE PROJECTS - What are the relevant cash flows associated with each project

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Rare species of spiders

In South America, a rare species of spiders is discovered and is transplanted into a safe area. Once they are transported the population of the spider after t months is P(t) = 44( 1 + 0.7t ) / ( 3 + 0.03t )

  Write a c++ program for encrypting and decrypting files

Write a C++ program for encrypting and decrypting files. Since this program performs two different functionalities (encryption and decryption), prompt the user to select the type of cryptographic technique as shown below.

  Write a complete c# program that expects three command

Write a complete C# program that expects three (3) command line arguments.

  What is the overall input offset voltage

The circuit of Fig. 14.32 is designed for an input offset voltage of 1 mV. If the width of the transistors in the input differential pair of the amplifier is doubled, what is the overall input offset voltage? (Neglect the input capacitance of the ..

  Comparable-risk bond

Should you purchase the bond if the yield to maturity on a comparable-risk bond is 11%?

  What are three main types of data warehouse usage

What are the differences between the three main types of data warehouse usage: information processing, analytical processing, and data mining? Discuss the motivation behind OLAP mining (OLAM).

  Takes a string as input and returns a string

Write a method that takes a String as input and returns a String containing the middle character of the String if the length of that String is odd.

  What happens and why that behavior is a problem

What kinds of problems can arise when two hosts on the same Ethernet share the same hardware address? Describe what happens and why that behavior is a problem.

  What is the subnet address of host

What is the subnet address of this host and how many hosts could this network have?

  Importance of chain of custody in case of computer forensics

Explain importance of chain of custody in the case of computer forensics. You may show your viewpoint by giving examples showing that "common beliefs".

  Array to mimic the behavior of the arraylist class

Design and implement a class that uses an array to mimic the behavior of the ArrayList class. Include as many methods from the ArrayList class as possible. Write a program to test your implementation.

  Determines if the value is prime

Write a program that gets a starting value from the user and then prints the Syracuse sequence for that starting value.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd